Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    RSA Key Recovery from Digit Equivalence Information

    The seminal work of Heninger and Shacham (Crypto 2009) demonstrated a method for reconstructing secret RSA keys from partial information of the key components. In this paper we further investigate this approa...

    Chitchanok Chuengsatiansup, Andrew Feutrill in Applied Cryptography and Network Security (2022)

  2. No Access

    Article

    A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

    Microarchitectural timing channels expose hidden hardware states though timing. We survey recent attacks that exploit microarchitectural features in shared hardware, especially as they are relevant for cloud c...

    Qian Ge, Yuval Yarom, David Cock, Gernot Heiser in Journal of Cryptographic Engineering (2018)

  3. No Access

    Book and Conference Proceedings

    Security, Privacy, and Applied Cryptography Engineering

    8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings

    Anupam Chattopadhyay, Chester Rebeiro in Lecture Notes in Computer Science (2018)

  4. No Access

    Article

    CacheBleed: a timing attack on OpenSSL constant-time RSA

    The scatter–gather technique is a commonly implemented approach to prevent cache-based timing attacks. In this paper, we show that scatter–gather is not constant time. We implement a cache timing attack agains...

    Yuval Yarom, Daniel Genkin, Nadia Heninger in Journal of Cryptographic Engineering (2017)